Information and Systems-Image Engineering(Date:2020/03/02)

Presentation
Implementation of aggregate message authentication and its evaluation

Atsuhiro Yamagishi(JDC),  Yoshio Takeuchi(JDC),  Tatsuya Takehisa(NISSIN),  Hidekazu Nishiura(NISSIN),  Zoa Jiafa(NISSIN),  Yu Imamura(JDC),  Junji Sikata(YNU),  Shoichi Hirose(JDC),  Koji Nakao(YNU),  Yuko Ishida(JDC),  Hideki Imai(JDC),  Yasuo Hirata(JDC),  

[Date]2020-03-02
[Paper #]ICSS2019-96
Backdoor Detection Based On Network Functions For IoT Devices

Minami Yoda(UEC),  Shuji Sakuraba(UEC),  Junichi Yamamoto(UEC),  Yuichi Sei(UEC/JST PRESTO),  Yasuyuki Tahara(UEC),  Akihiko Ohsuga(UEC),  

[Date]2020-03-02
[Paper #]ICSS2019-78
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring

Takeshi Takahashi(NICT),  Ryutaro Ushigome(NICT),  Mio Suzuki(NICT),  Daisuke Inoue(NICT),  

[Date]2020-03-02
[Paper #]ICSS2019-93
An Evaluation of Contact Points for Security Notifications

Miori Saito(Yokohama National Univ.),  Rui Tanabe(Yokohama National Univ.),  Akira Fujita(Yokohama National Univ.),  Katsunari Yoshioka(Yokohama National Univ.),  Tsutomu Matsumoto(Yokohama National Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-94
ファームウェアに着目したIoT機器のセキュリティ機能の調査

Shugo Shiraishi(Okayama Univ.),  Akifumi Fukumoto(Okayama Univ.),  Eitaro Shioji(NTT),  Mitsuaki Akiyama(NTT),  Toshihiro Yamauchi(Okayama Univ./JST, PRESTO),  

[Date]2020-03-02
[Paper #]ICSS2019-74
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model

Moritoshi Aoyanagi(IISEC),  Hidenori Tsuji(IISEC),  Masaki Hashimoto(IISEC),  

[Date]2020-03-02
[Paper #]ICSS2019-75
Information Rates for Multiple Assignment Schemes on Five Participants

Yutaro Shimma(Nihon Univ.),  Kouya Tochikubo(Nihon Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-70
A Verification Method of Infrastructure as Code using Alloy Analyzer

Ryo Hase(Mitsubishi Electric),  Yohei Matsuura(Mitsubishi Electric),  

[Date]2020-03-02
[Paper #]ICSS2019-71
Generating Adversarial Videos that Bypass Content Filtering

Norihito Omori(Waseda Univ.),  Tatsuya Mori(Waseda Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-95
Extension of authentication method using hash chain aggregation

Hirai Shinta(Hiroshima City Univ.),  Soshi Masakazu(Hiroshima City Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-97
A Study on Fuzzing for Device Drivers with AddressSanitizer

Kentaro Ishii(Kove Univ.),  Ryoichi Isawa(NICT),  Masakatu Morii(Kove Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-76
Effect of Environmental Temperature Change in LED Fingerprinting

Ayaka Tsuchiya(UEC),  Akiko Toh(UEC),  Yang Li(UEC),  Kazuo Sakiyama(UEC),  Takeshi Sugawara(UEC),  

[Date]2020-03-02
[Paper #]ICSS2019-72
Securty Analysis of Salsa20 and ChaCha Using Inverse Function's Properties

Yusuke Matsuoka(Osaka Univ.),  Atsuko Miyaji(Osaka Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-98
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript

Keisuke Sugita(Kobe Univ.),  Ryoichi Isawa(NICT),  Masakatsu Morii(Kobe Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-79
Estimation method of information asset security attributes using design mode

Takeshi Ueda(Mitsubishi Electric Corp.),  Koichi Shimizu(Mitsubishi Electric Corp.),  Shun Hinatsu(Mitsubishi Electric Corp.),  Fumio Omatsu(Mitsubishi Electric Corp.),  

[Date]2020-03-02
[Paper #]ICSS2019-69
Development of a recovery tool for a ransomware infected PC

Ryosuke Kokado(Kobe Univ.),  Masato Ikegami(Canon MJ),  Tomohisa Hasegawa(Canon MJ),  Takafumi Harada(Canon MJ),  Hiroshi Kitani(Canon MJ),  Masakatu Morii(Kobe Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-77
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring

Yukiko Endo(NICT),  Yoshiki Mori(NICT),  Jumpei Shimamura(Clwit),  Masaki Kubo(NICT),  

[Date]2020-03-02
[Paper #]ICSS2019-80
Log Storing System Using Blockchain

Takashi Ikeda(Saga Univ.),  Masanori Hirotomo(Saga Univ.),  Youji Fukuta(Kindai Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-73
Improvement of the Backup Method Dealing with 2 Types of Damages

Taiga Hasuike(Kanazawa Univ.),  Masahiro Mambo(Kanazawa Univ.),  

[Date]2020-03-02
[Paper #]ICSS2019-68
The efficient and high level of commitment scheme with low output locality

Hideaki Miyaji(OU),  Atsuko Miyaji(OU),  

[Date]2020-03-02
[Paper #]ICSS2019-99
12>> 1-20hit(40hit)